EZINE:
In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.
EZINE:
Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
EBOOK:
Named Project of the Year in the Computer Weekly Innovation Awards APAC 2022, StratMed's Integer platform is facilitating data exchanges between healthcare providers and their suppliers to improve transparency in India's healthcare supply chain.
EZINE:
In this handbook, focused on the use of business intelligence and data analytics in the Asia-Pacific region, Computer Weekly looks at some examples of how making sense of data makes good business sense.
EGUIDE:
Western Australian aged care provider Juniper embarked on an aggressive strategy to completely transform its IT operations in just two years. This 1-page brief summarises how this overhaul has helped free up the resources needed to provide better quality of care for residents.
EGUIDE:
In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.
EGUIDE:
While GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.
EGUIDE:
In this interview, Soumya Ghoshal, managing director, middle office technology, technology and operations, explains DBS Bank's credit architecture program, how it has freed up more time for relationship managers through automation, and the bank's general approach to innovation.
EGUIDE:
In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
EGUIDE:
The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.